Skip to main content
Log in

Anti-forensics of double JPEG compression with the same quantization matrix

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Double JPEG compression detection plays an important role in digital image forensics. Recently, Huang et al. (IEEE Trans Inf Forensics Security 5(4):848–856, 2010) first pointed out that the number of different discrete cosine transform (DCT) coefficients would monotonically decrease when repeatedly compressing a JPEG image with the same quantization matrix, and a strategy based on random permutation was developed to expose such an operation successfully. In this paper, we propose an anti-forensic method to fool this method. The proposed method tries to slightly modify the DCT coefficients for confusing the traces introduced by double JPEG compression with the same quantization matrix. By investigating the relationship between the DCT coefficients of the first compression and those of the second one, we determine the quantity of modification by constructing a linear model. Furthermore, in order to improve the security of anti-forensics, the locations of modification are adaptively selected according to the complexity of the image texture. The extensive experiments evaluated on 10,000 natural images have shown that the proposed method can effectively confuse the detector proposed in Huang et al. (IEEE Trans Inf Forensics Security 5(4):848–856, 2010), while keeping higher visual quality and leaving fewer other detectable statistical artifacts.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Bas P, Filler T, Pevný T (2011) Break our steganographic system: the ins and outs of organizing boss.In: Information hiding. Lecture notes in computer science, vol 6958, pp 59–70

  2. Chen C, Shi Y (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proceeding of IEEE international symposium circuits and systems, pp 3029–3032

  3. Fan W, Wang K, Cayre F, Xiong Z (2013) A variational approach to JPEG anti-forensics.In: Proceeding of IEEE international conference on acoustics speech and signal processing, pp 3058–3062

  4. Fan Z, de Queiroz R (2003) Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans Image Process 12(2):230–235

    Article  Google Scholar 

  5. Farid H (2009) Exposing digital forgeries from JPEG ghosts. IEEE Trans Inf Forensics Security 4(1):154–160

    Article  MathSciNet  Google Scholar 

  6. Feng C, Xu Z, Zheng X (2012) An anti-forensic algorithm of JPEG double compression based forgery detection.In: Proceeding of 4th international symposium on information science and engineering, pp 159–164

  7. Gonzalez RC, Woods RE (2008) Digital image processing, 3rd edn. Prentice Hall

  8. Huang F, Huang J, Shi YQ (2010) Detecting double JPEG compression with the same quantization matrix. IEEE Trans Inf Forensics Security 5(4):848–856

    Article  Google Scholar 

  9. Huang F, Luo W, Huang J (2011) Steganalysis of JPEG steganography with complementary embedding strategy. IET Inf Secur 5(1):10–18

    Article  Google Scholar 

  10. Kodovský J, Fridrich J (2009) Calibration revisited.In: Proceeding of 11th ACM workshop on multimedia and security. New York, NY, pp 63–74

  11. Li B, Shi Y, Huang J (2008) Detecting doubly compressed JPEG images by using mode based first digit features.In: Proceeding of IEEE international workshop on multimedia signal processing, pp 730–735

  12. Li H, Luo W, Huang J (2012) Countering anti-JPEG compression forensics.In: Proceeding of IEEE international conference on image processing, pp 241–244

  13. Lukáš J, Fridrich J (2003) Estimation of primary quantization matrix in double compressed JPEG images.In: Proceeding of digital forensic research workshop, pp 5–8

  14. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited.IEEE Trans Inf Forensics Security 5(2):201–214

    Article  MathSciNet  Google Scholar 

  15. Luo W, Huang F, Huang J (2011) A more secure steganography based on adaptive pixel-value differencing scheme. Multimed Tools Appl 52(2–3):407–430

    Article  Google Scholar 

  16. Luo W, Huang J, Qiu G (2010) JPEG error analysis and its applications to digital image forensics. IEEE Trans Inf Forensics Security 5(3):480–491

    Article  Google Scholar 

  17. Luo W, Qu Z, Huang J, Qiu G (2007) A novel method for detecting cropped and recompressed image block.In: Proceeding of IEEE international conference on acoustics, speech and signal processing, vol 2, pp 217–220

  18. Milani S, Tagliasacchi M, Tubaro S (2013) Antiforensics attacks to benford’s law for the detection of double compressed images.In: Proceeding of IEEE international conference on acoustics speech and signal processing, pp 3053–3057

  19. Pasquini C, Boato G (2013) JPEG compression anti-forensics based on first significant digit distribution.In: Proceeding of IEEE international workshop on multimedia signal processing, pp 500–505

  20. Qian Z, Qiao T (2013) Simplified anti-forensics of JPEG compression. J Comput 8(10):2483–2488

    Article  Google Scholar 

  21. Software: Statistical pattern recognition toolbox (2011). http://cmp.felk.cvut.cz/cmp/software/stprtool/

  22. Stamm M, Liu K (2011) Anti-forensics of digital image compression. IEEE Trans Inf Forensics Security 6(3):1050–1065

    Article  Google Scholar 

  23. Sutthiwan P, Shi YQ (2012) Anti-forensics of double JPEG compression detectionIn: Proceeding of 10th international workshop on digital-forensics and watermarking, vol 7128, pp 411–424

  24. Valenzise G, Tagliasacchi M, Tubaro S (2013) Revealing the traces of JPEG compression anti-forensics. IEEE Trans Inf Forensics Security 8(2):335–349

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported in part by National Science & Technology Pillar Program (No:2012BAK16B06), NSFC (U1135001, 61332012, 61272191), the funding of Zhujiang Science and Technology (2011J2200091) and the Guangdong NSF (S2013010012039). The authors would like to thank the reviewers for their valuable comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weiqi Luo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, H., Luo, W. & Huang, J. Anti-forensics of double JPEG compression with the same quantization matrix. Multimed Tools Appl 74, 6729–6744 (2015). https://doi.org/10.1007/s11042-014-1927-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-1927-0

Keywords

Navigation